SlideShare a Scribd company logo
1 of 32
Download to read offline
SECURITY AND COMPLIANCE IN
THE CLOUD
• Bart Falzarano
Director of Security & Compliance, RightScale
• Roberto Monge
Cloud Solutions Engineer, RightScale
Q&A
• Steve Kochenderfer
Sales Development Representative, RightScale
Please use the “Questions” window to ask questions at any time
Your Panel Today
• Data Breaches/Security Threats
• Evaluating Security of IaaS providers
• Addressing Security Gaps with Vanilla/Out-of-the-Box Cloud
Infrastructure
• Live Demo of the RightScale Approach
• Q & A
Agenda
Data Breaches Occur Everywhere
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
• Data Breaches
-Misconfigurations/Improper Design
• Data Loss
-Cloud Provider suffers Data loss or Customer loses encryption keys
• Account Hijacking
-Phishing, Cross-Site Scripting XSS bugs
• Secret keys sniffed on the network or stored on Laptops/Desktops
• Denial of Service DoS & DDoS attacks
• Malicious Insiders
• Abuse of Cloud Services
-Use array of servers to stage DDoS, crack encryption keys, distribute malware
Most Threats are Not Cloud Specific
Evaluating the Security of IaaS Cloud Providers
Cloud
Provider PCIDSS1
HIPAA
SSAE16
ISO27001
CSA
FedRAMP
Additional certifications, notes, and references
SOC1 SOC2 SOC
3
Amazon AWS
✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
ITAR, FIPS140-2, DIACAP, FISMA
Amazon AWS GovCloud (US) environment
FedRAMP issued for both AWS GovCloud (US) and AWS US
East/West regions
For complete scope reference:
http://aws.amazon.com/compliance/
Microsoft
Windows
Azure
-
✔ ✔ ✔
-
✔ ✔ ✔
CSA CCM audit completed as part of their SOC2 assessment
For complete scope reference:
http://www.windowsazure.com/en-us/support/trust-center/compliance/
Rackspace
✔
-
✔ ✔ ✔ ✔
- - Safe Harbor Certified – EU Directive 95/46/EC on the protection of
personal data
SOC2 -Security and Availability Only
For complete scope reference:
http://www.rackspace.com/about/whyrackspace/
Google
Compute
Engine
-
✔ ✔ ✔ ✔ ✔
- - Data is encrypted on local ephemeral disk and persistent disk. All
data written to disk in Compute Engine is encrypted at rest using the
AES-128-CBC algorithm
For complete scope reference:
https://cloud.google.com/products/compute-engine/
Public Clouds Expand Security Capabilities
Network Security
• Secure access with SSL
• VPC and ingress/egress
firewalls
• Private subnets w/VPC &
IPSEC VPN
• Dedicated connections
(Direct Connect),
• Separate Regions
(GovCloud)
Data Security
• Advanced Encryption
Standard (AES) 256, a
secure symmetric-key
encryption standard using
256-bit encryption keys
• AWS: HSM to manage keys
• Google: Encrypts data at
rest
• Role-Based Access Control
& MFA
Process Security
• Strong physical security
controls
• Self-service provisioning and
automation to avoid human
errors
• Deep security expertise at
cloud providers
• Support for customer
penetration testing
• Network monitoring and
protection
Place Cloud Beginners Cloud Focused
#1 Security (31%) Compliance (18%)
#2 Compliance (30%) Cost (17%)
#3 Managing multiple cloud
services (28%)
Performance (15%)
#4 Integration to internal
systems (28%)
Managing multiple cloud
services (13%)
#5 Governance/Control (26%) Security (13%)
Experience in the Cloud Changes Issues
Top 5 Challenges Change with Cloud Maturity
Source: RightScale 2014 State of the Cloud Report
Enterprises Choosing Multi-Cloud
Single private
9%
Single public
13%
No plans
4% Multiple private
11%
Multiple public
15%
Hybrid cloud
48%
74%
Enterprise Cloud Strategy
1000+ employees
Multi-Cloud
74%
Source: RightScale 2014 State of the Cloud Report
Application
Portfolio
Requirements
Filters
Resource
Pools
App 1
App 2
App 3
Performance
Cost
Compliance
Geo-location
Security
Multi-Cloud is an Enterprise Reality
App N
…
Hosted Private
Public Cloud 2
Public Cloud 1
Vendors
Existing DC
App 4
App 5 Internal Private
Virtualized
App 1 App 2
App 3
App 4 App 5
App 6
App 7
• Cloud Management & API differences across cloud providers
• Identity & Access Management / Access Control
• Change & Configuration Management
• Network & Data Security
• Business Continuity Planning/ Disaster Recovery
• Monitoring/Alerting Incident Response and Assessment
• Audit and Compliance
Security Gaps Remain
How RightScale Addresses The Gaps
Standardize & Automate
Baseline Security / Standardized
configurations, track versions,
automate patching, monitoring,
alerting, etc.
Multi-Cloud
Govern many clouds with
a single pane of glass
Outage-Proof & DR
Ensure applications stay up
during cloud or data center
outages
Audit & Compliance
Maintain a complete audit trail
and comply with regulations
Network & Data Security
Manage cloud network
configurations and encrypt data
Access Control
Integrate to SSO and control
access to cloud credentials
Decentralized Cloud Management
Be Ready To Manage a Portfolio of Clouds
Your Cloud Portfolio
Self-Service Cloud AnalyticsCloud Management
Manage Govern Optimize
RightScale Cloud Portfolio Management
Public
Clouds
Private
Clouds
Virtualized
Environments
Single pane of glass
o Deep integration to public
and private cloud
providers
o Elevates:
• Configurations
• APIs
• Automation behaviors
• Access control
• Billing and governance
o Deploy to clouds and
virtualized environment
o Move between clouds
and virtualized
Manage Public, Private and Virtualized
On-premises
Private
Clouds
RightScale Cloud Portfolio Management
Corporate Firewall
RightScale Cloud
Appliance for vSphere
vCenter Server™
ESXi
VMware® vSphere®
Public
Clouds
Egress only option
Robust Governance
• API or GUI account
provisioning
• Temporary users
• SSO integration
• SAML or OpenID
• Role based access control
• Hierarchical organization
of accounts
• Limit access to cloud
credentials
• Cloud resources isolated
per account
Control Enterprise Access
Enforce Policies
o Pre-defined stacks to
meet corporate standards
o Configured to your
security requirements
o Define which clouds can
be used
o Control user options and
choices
o Control costs through
quotas
From Rogue to Policy-Based Cloud Usage
Enforce standards
o Automate provisioning and
configuration across
clouds
o Version-controlled
o Follow standards for
versions, patches and
configuration
o Leverage a variety of
scripting languages
Standardize with ServerTemplates
http://www.rightscale.com/blog/cloud-management-best-practices/rightscale-servertemplates-explained
Enforce standards
o Modular building block
approach to managing and
securing server
configurations
o Automate baseline
security settings / system
hardening configurations
o Version-controlled / Anti-
tamper
o Perform system and
security configuration
audits
Enforce Security Configuration Baselines with ServerTemplates
Repeatability and Consistency
RightScale Solution
• Scalable campaigns on tight deadlines
• Clone-able, customizable environments
• Deliver SLAs during huge traffic spikes
• Control infrastructure costs for clientsIncrease Investment Flexibility
Reduce Risk
Improve IT Efficiency
Monitor, Alert, Automate
o Application, cluster and
server-level monitoring
o 80 built-in server, volume,
database, and application
monitors.
o Assign alerts to any
metric.
o Customize escalations
o Trigger automated scaling,
operational scripts, and
notifications
o Create self-healing
servers and deployments
Keep Tabs on All Cloud Resources in One Place
Ensure compliance
o See who changed what
and when
o Provide audit logs and
reports to satisfy
regulators
o Available via API to
integrate with other
systems
Gain Visibility with Audit Trails
Intimately Understand
your Cloud Spend
o Quickly identify &
diagnose spikes in activity
o Visibility by project & user
o Planning and forecasting
o Budgets and cost controls
o Allocations
o Chargeback and
showback
o Optimize spend
Maintain a Pulse on your Cloud Costs
Secure Cloud with Network Manager
Clouds
Networks
Instances
Subnets
IP Address Bindings
Security Groups
Network ACLs
Routing Tables
IP Addresses
Abstract Network Security
o Manage network
configuration across
clouds
• VPCs
• Subnets
• Security groups
• Network gateways
o Maintain ability to leverage
cloud-specific features
o Control permissions and
audit changes to network
configuration
o API and UI access
Visualize Security
o Visualize and audit
network configuration
parameters
o Understand which
deployments and security
groups have which ports
open to which IP
addresses
View Network Security in Context
Protect Confidential Information
RightScale Solution
• Protect PII
• Deliver visibility & governance
• Optimize lifecycle automation
“RightScale gives us visibility.
It helped us develop trust with
security, finance, development
and management.”
-John Fitch
Accelerate Application Delivery
Reduce Risk
Data Residency with a Global Cloud Platform
Outage-Proof with Independent Control Plane
Replicate >
< Failover> < Failover>
Your Public
Cloud A
RightScale
Primary
RightScale
Backup
Your Public
Cloud B
Your Private
Cloud
RightScale UI RightScale API
User BUser A User C
Globally Hosted
Scalable
Resilient
SaaS Platform
Your Cloud
Applications
Secure authentication
and communication
DEMO
Security
Lifecycle
Assess/Desi
gn
Set Policies
& Controls/
Implement
Monitor &
Enforce/
Sustain
Measure /
Evaluate
Security Development Life Cycle
o U.S.-EU Safe Harbor Framework
o U.S.-Swiss Safe Harbor Framework
o SSAE16 SOC1Type II & SOC2 Type II (in process)
RightScale Certifications
Next Steps and Q&A
• Talk to us today about your requirements:
+1 888-989-1856
• Learn more – request more info:
• RightScale Security White Paper
• ServerTemplates and HSM configuration
brief
• Try RightScale Today:
www.rightscale.com/free-trial

More Related Content

What's hot

AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - Keynote
Amazon Web Services
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
Amazon Web Services
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
CloudPassage
 

What's hot (20)

AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on security
 
Migrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceMigrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with Confidence
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSDeploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
 
AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - Keynote
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
HIPAA and HITRUST on AWS
HIPAA and HITRUST on AWSHIPAA and HITRUST on AWS
HIPAA and HITRUST on AWS
 
Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design Considerations
 
Pre-launch Checklist for Going Production on AWS
Pre-launch Checklist for Going Production on AWS Pre-launch Checklist for Going Production on AWS
Pre-launch Checklist for Going Production on AWS
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud Infrastructure
 
AWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by DesignAWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by Design
 
AWS User Group - Security & Compliance
AWS User Group - Security & ComplianceAWS User Group - Security & Compliance
AWS User Group - Security & Compliance
 

Viewers also liked

Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...
Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...
Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...
exponential-inc
 
Adaptive SLA-aware Cloud Federations
Adaptive SLA-awareCloud FederationsAdaptive SLA-awareCloud Federations
Adaptive SLA-aware Cloud Federations
keratt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 

Viewers also liked (9)

Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...
Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...
Keynote Address at 2013 CloudCon: Future of Enterprise IT: Manage Cloud Spraw...
 
Adaptive SLA-aware Cloud Federations
Adaptive SLA-awareCloud FederationsAdaptive SLA-awareCloud Federations
Adaptive SLA-aware Cloud Federations
 
SLAs and Performance in the Cloud: Because There is More Than "Just" Availabi...
SLAs and Performance in the Cloud: Because There is More Than "Just" Availabi...SLAs and Performance in the Cloud: Because There is More Than "Just" Availabi...
SLAs and Performance in the Cloud: Because There is More Than "Just" Availabi...
 
Splunk for AWS (Bagels and Bytes)
Splunk for AWS (Bagels and Bytes)Splunk for AWS (Bagels and Bytes)
Splunk for AWS (Bagels and Bytes)
 
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
 
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similar to RightScale Webinar: Security and Compliance in the Cloud

Similar to RightScale Webinar: Security and Compliance in the Cloud (20)

8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
 
Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
Building Multi-tenant, Configurable, High Quality Applications on .NET for an...
 
Getting started with AWS Security
Getting started with AWS SecurityGetting started with AWS Security
Getting started with AWS Security
 

More from RightScale

More from RightScale (20)

10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance
 
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsKubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScale
 
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowPrepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 
Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)
 
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMComparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
 
How to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaHow to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale Optima
 
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
 
Using RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsUsing RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider Tools
 
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreAutomating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
 
The 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesThe 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for Enterprises
 
9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs
 
Serverless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMServerless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBM
 
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessBest Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
 
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMCloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
 
2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report
 
Got a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsGot a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP Helps
 
How to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaHow to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale Optima
 
Top 10 Cloud Trends for 2018 and Actions You Can Take Now
Top 10 Cloud Trends for 2018 and Actions You Can Take NowTop 10 Cloud Trends for 2018 and Actions You Can Take Now
Top 10 Cloud Trends for 2018 and Actions You Can Take Now
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

RightScale Webinar: Security and Compliance in the Cloud

  • 1. SECURITY AND COMPLIANCE IN THE CLOUD
  • 2. • Bart Falzarano Director of Security & Compliance, RightScale • Roberto Monge Cloud Solutions Engineer, RightScale Q&A • Steve Kochenderfer Sales Development Representative, RightScale Please use the “Questions” window to ask questions at any time Your Panel Today
  • 3. • Data Breaches/Security Threats • Evaluating Security of IaaS providers • Addressing Security Gaps with Vanilla/Out-of-the-Box Cloud Infrastructure • Live Demo of the RightScale Approach • Q & A Agenda
  • 4. Data Breaches Occur Everywhere http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 5. • Data Breaches -Misconfigurations/Improper Design • Data Loss -Cloud Provider suffers Data loss or Customer loses encryption keys • Account Hijacking -Phishing, Cross-Site Scripting XSS bugs • Secret keys sniffed on the network or stored on Laptops/Desktops • Denial of Service DoS & DDoS attacks • Malicious Insiders • Abuse of Cloud Services -Use array of servers to stage DDoS, crack encryption keys, distribute malware Most Threats are Not Cloud Specific
  • 6. Evaluating the Security of IaaS Cloud Providers Cloud Provider PCIDSS1 HIPAA SSAE16 ISO27001 CSA FedRAMP Additional certifications, notes, and references SOC1 SOC2 SOC 3 Amazon AWS ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ITAR, FIPS140-2, DIACAP, FISMA Amazon AWS GovCloud (US) environment FedRAMP issued for both AWS GovCloud (US) and AWS US East/West regions For complete scope reference: http://aws.amazon.com/compliance/ Microsoft Windows Azure - ✔ ✔ ✔ - ✔ ✔ ✔ CSA CCM audit completed as part of their SOC2 assessment For complete scope reference: http://www.windowsazure.com/en-us/support/trust-center/compliance/ Rackspace ✔ - ✔ ✔ ✔ ✔ - - Safe Harbor Certified – EU Directive 95/46/EC on the protection of personal data SOC2 -Security and Availability Only For complete scope reference: http://www.rackspace.com/about/whyrackspace/ Google Compute Engine - ✔ ✔ ✔ ✔ ✔ - - Data is encrypted on local ephemeral disk and persistent disk. All data written to disk in Compute Engine is encrypted at rest using the AES-128-CBC algorithm For complete scope reference: https://cloud.google.com/products/compute-engine/
  • 7. Public Clouds Expand Security Capabilities Network Security • Secure access with SSL • VPC and ingress/egress firewalls • Private subnets w/VPC & IPSEC VPN • Dedicated connections (Direct Connect), • Separate Regions (GovCloud) Data Security • Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard using 256-bit encryption keys • AWS: HSM to manage keys • Google: Encrypts data at rest • Role-Based Access Control & MFA Process Security • Strong physical security controls • Self-service provisioning and automation to avoid human errors • Deep security expertise at cloud providers • Support for customer penetration testing • Network monitoring and protection
  • 8. Place Cloud Beginners Cloud Focused #1 Security (31%) Compliance (18%) #2 Compliance (30%) Cost (17%) #3 Managing multiple cloud services (28%) Performance (15%) #4 Integration to internal systems (28%) Managing multiple cloud services (13%) #5 Governance/Control (26%) Security (13%) Experience in the Cloud Changes Issues Top 5 Challenges Change with Cloud Maturity Source: RightScale 2014 State of the Cloud Report
  • 9. Enterprises Choosing Multi-Cloud Single private 9% Single public 13% No plans 4% Multiple private 11% Multiple public 15% Hybrid cloud 48% 74% Enterprise Cloud Strategy 1000+ employees Multi-Cloud 74% Source: RightScale 2014 State of the Cloud Report
  • 10. Application Portfolio Requirements Filters Resource Pools App 1 App 2 App 3 Performance Cost Compliance Geo-location Security Multi-Cloud is an Enterprise Reality App N … Hosted Private Public Cloud 2 Public Cloud 1 Vendors Existing DC App 4 App 5 Internal Private Virtualized App 1 App 2 App 3 App 4 App 5 App 6 App 7
  • 11. • Cloud Management & API differences across cloud providers • Identity & Access Management / Access Control • Change & Configuration Management • Network & Data Security • Business Continuity Planning/ Disaster Recovery • Monitoring/Alerting Incident Response and Assessment • Audit and Compliance Security Gaps Remain
  • 12. How RightScale Addresses The Gaps Standardize & Automate Baseline Security / Standardized configurations, track versions, automate patching, monitoring, alerting, etc. Multi-Cloud Govern many clouds with a single pane of glass Outage-Proof & DR Ensure applications stay up during cloud or data center outages Audit & Compliance Maintain a complete audit trail and comply with regulations Network & Data Security Manage cloud network configurations and encrypt data Access Control Integrate to SSO and control access to cloud credentials
  • 14. Be Ready To Manage a Portfolio of Clouds Your Cloud Portfolio Self-Service Cloud AnalyticsCloud Management Manage Govern Optimize RightScale Cloud Portfolio Management Public Clouds Private Clouds Virtualized Environments
  • 15. Single pane of glass o Deep integration to public and private cloud providers o Elevates: • Configurations • APIs • Automation behaviors • Access control • Billing and governance o Deploy to clouds and virtualized environment o Move between clouds and virtualized Manage Public, Private and Virtualized On-premises Private Clouds RightScale Cloud Portfolio Management Corporate Firewall RightScale Cloud Appliance for vSphere vCenter Server™ ESXi VMware® vSphere® Public Clouds Egress only option
  • 16. Robust Governance • API or GUI account provisioning • Temporary users • SSO integration • SAML or OpenID • Role based access control • Hierarchical organization of accounts • Limit access to cloud credentials • Cloud resources isolated per account Control Enterprise Access
  • 17. Enforce Policies o Pre-defined stacks to meet corporate standards o Configured to your security requirements o Define which clouds can be used o Control user options and choices o Control costs through quotas From Rogue to Policy-Based Cloud Usage
  • 18. Enforce standards o Automate provisioning and configuration across clouds o Version-controlled o Follow standards for versions, patches and configuration o Leverage a variety of scripting languages Standardize with ServerTemplates http://www.rightscale.com/blog/cloud-management-best-practices/rightscale-servertemplates-explained
  • 19. Enforce standards o Modular building block approach to managing and securing server configurations o Automate baseline security settings / system hardening configurations o Version-controlled / Anti- tamper o Perform system and security configuration audits Enforce Security Configuration Baselines with ServerTemplates
  • 20. Repeatability and Consistency RightScale Solution • Scalable campaigns on tight deadlines • Clone-able, customizable environments • Deliver SLAs during huge traffic spikes • Control infrastructure costs for clientsIncrease Investment Flexibility Reduce Risk Improve IT Efficiency
  • 21. Monitor, Alert, Automate o Application, cluster and server-level monitoring o 80 built-in server, volume, database, and application monitors. o Assign alerts to any metric. o Customize escalations o Trigger automated scaling, operational scripts, and notifications o Create self-healing servers and deployments Keep Tabs on All Cloud Resources in One Place
  • 22. Ensure compliance o See who changed what and when o Provide audit logs and reports to satisfy regulators o Available via API to integrate with other systems Gain Visibility with Audit Trails
  • 23. Intimately Understand your Cloud Spend o Quickly identify & diagnose spikes in activity o Visibility by project & user o Planning and forecasting o Budgets and cost controls o Allocations o Chargeback and showback o Optimize spend Maintain a Pulse on your Cloud Costs
  • 24. Secure Cloud with Network Manager Clouds Networks Instances Subnets IP Address Bindings Security Groups Network ACLs Routing Tables IP Addresses Abstract Network Security o Manage network configuration across clouds • VPCs • Subnets • Security groups • Network gateways o Maintain ability to leverage cloud-specific features o Control permissions and audit changes to network configuration o API and UI access
  • 25. Visualize Security o Visualize and audit network configuration parameters o Understand which deployments and security groups have which ports open to which IP addresses View Network Security in Context
  • 26. Protect Confidential Information RightScale Solution • Protect PII • Deliver visibility & governance • Optimize lifecycle automation “RightScale gives us visibility. It helped us develop trust with security, finance, development and management.” -John Fitch Accelerate Application Delivery Reduce Risk
  • 27. Data Residency with a Global Cloud Platform
  • 28. Outage-Proof with Independent Control Plane Replicate > < Failover> < Failover> Your Public Cloud A RightScale Primary RightScale Backup Your Public Cloud B Your Private Cloud RightScale UI RightScale API User BUser A User C Globally Hosted Scalable Resilient SaaS Platform Your Cloud Applications Secure authentication and communication
  • 29. DEMO
  • 30. Security Lifecycle Assess/Desi gn Set Policies & Controls/ Implement Monitor & Enforce/ Sustain Measure / Evaluate Security Development Life Cycle
  • 31. o U.S.-EU Safe Harbor Framework o U.S.-Swiss Safe Harbor Framework o SSAE16 SOC1Type II & SOC2 Type II (in process) RightScale Certifications
  • 32. Next Steps and Q&A • Talk to us today about your requirements: +1 888-989-1856 • Learn more – request more info: • RightScale Security White Paper • ServerTemplates and HSM configuration brief • Try RightScale Today: www.rightscale.com/free-trial